3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications

Research Article

Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security

  • @INPROCEEDINGS{10.1109/CROWNCOM.2008.4562536,
        author={Jack L. Burbank},
        title={Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security},
        proceedings={3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications},
        publisher={IEEE},
        proceedings_a={CROWNCOM},
        year={2008},
        month={7},
        keywords={},
        doi={10.1109/CROWNCOM.2008.4562536}
    }
    
  • Jack L. Burbank
    Year: 2008
    Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security
    CROWNCOM
    IEEE
    DOI: 10.1109/CROWNCOM.2008.4562536
Jack L. Burbank1,*
  • 1: The Johns Hopkins University Applied Physics Laboratory 11100 Johns Hopkins Road Laurel, MD 20723
*Contact email: jack.burbank@jhuapl.edu

Abstract

This paper discusses the topic of wireless security in cognitive radio networks, delineating the key challenges in this area. With the ever-increasing scarcity of spectrum, cognitive radios are expected to become an increasingly important part of the overall wireless networking landscape. However, there is an important technical area that has received little attention to date in the cognitive radio paradigm: wireless security. The cognitive radio paradigm introduces entirely new classes of security threats and challenges, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper delineates the key challenges in providing security in cognitive networks, discusses the current security posture of the emerging IEEE 802.22 cognitive radio standard, and identifies potential vulnerabilities along with potential mitigation approaches.